| 
	|
| 
		 | 
	
| 
			 
			
				
 
		
			
		 
			One of the most 
			important features to ensure a system is its availability. In case 
			we have a failure (hardware, software, inadvertent or premeditated 
			by other parties) to disable some or all of the data found in the 
			system, we have mechanisms that allow us to restore service as 
			quickly and best.  
			RecuperaData offers 
			some guidelines on the importance of good backup policy: 
			- Redundancy: 
			The service offered itself must be offered by two or more nodes of 
			each device in what is known as a cluster. Thus, if a node in any 
			part of a longer operational, he / the other / s still doing the 
			same function. It is a good measure, lead to the very service itself 
			differently in different geographic location to avoid disaster (which, 
			although rare, occur) in which an entire building that houses one or 
			more data centers, burned or destroyed by any such attack. 
			- Cold Backup: 
			Just install the fully functional system, tuned, optimized, patched 
			and secured, it is essential to what is called a cold backup of the 
			installation. This same type of copy should make it quite often to 
			get back to a known functioning point, if some catastrophe happens. 
			At least you know that "up here" and you can always worked well from 
			here if you get to do a restore. The copies are called cold because 
			they are made without using any of the data on the disks, ie there 
			is no file in use. The best way is to make booting with another 
			operating system Live (either on a CD or USB ) and copy disk 
			partitions completely as they are, without even accessing the files 
			themselves. 
			- Hot Backup: 
			Consists of copy that we consider critical data from one system to 
			another location. The aim is to have a more updated copy of the same 
			of what we can give a cold back. What is stored and the frequency 
			defined in this case, much depends on the functionality of the 
			system itself, as well as the changing of the data, so it should be 
			taken case by case basis by those responsible for the information 
			saved. To do so is often used backup software, free or commercial, 
			or in some cases through scripts crafted to copy a tar.gz/bz2 or 
			(pick your favorite compression algorithm) to package the data. With 
			each packet of data backed up, you should not leave them on the 
			machine itself, but send them elsewhere. If a home network where one 
			does not wish to have several machines running, you may copy itself 
			to be valid in a rewritable DVD or USB permanently connected in 
			order to have an updated copy if the disks fail, but in the case of 
			a company, it is best to have centralized the copy in another 
			location such as through online 
			backup. 
			- Vaulting: 
			This type of backup is that the data (hot) they replicate in "almost 
			real time" in another location. Often costly in terms of bandwidth 
			needed to carry data of many machines to another site, but allows 
			catastrophe if the full path, the latest available data found on 
			other sites. It is important to keep data from multiple "times" 
			because if a machine is compromised or trojanized and restores the 
			last backup exists, the Trojan is also restored to the machine again. 
			- Time machine: 
			Although this concept became known as the Apple original, and not a 
			standard "backup" is a hybrid between Vaulting and Hot Copy. The 
			idea is to define a device (either an external drive or Time Capsule 
			via wireless network) on which quite often are set to become "hot 
			copy". No Electronic Vaulting becomes itself, but it is a good 
			solution for networks "home." Linux operating systems can use 
			TimeVault.  
			    Our technicians 
are highly skilled in 
data recovery .
  | 
		|||||||||||||||||||||||||||||||||||
| 
	                     
	                    � 2014 
						 
						
						RECUPERADATA: 
						
						data recovery    
	   | 
		|||||||||||||||||||||||||||||||||||
| 
	                     Design by: Template World  |